{"title":"An Analytical Study of Network Coding in the Presence of Real-Time Messages","authors":"Marc Aoun, P. Beekhuizen, A. Argyriou","doi":"10.1109/NETCOD.2010.5487663","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487663","url":null,"abstract":"With network coding, two data packets are transformed into one by a simple XOR-operation. The transformed packet is transmitted and each original packet can be retrieved at its destination node through a similar XOR-operation. Network coding is an important research topic as it radically challenges existing networking paradigms. In this paper we provide an analytical study of the impact network coding has on the delivery of real-time packets (i.e., packets with deadlines). We model a router as a queueing system where packets arrive from two independent Poisson flows. We obtain an exact expression for the goodput of the system and study the goodput gain that can be achieved by performing network coding. We verify the validity of the model through simulations.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117161353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prioritized Wireless Transmissions Using Random Linear Codes","authors":"Tuan T. Tran, Thinh P. Q. Nguyen","doi":"10.1109/NETCOD.2010.5487690","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487690","url":null,"abstract":"We investigate approximation algorithms for the problem of prioritized broadcast transmissions over independent erasure channels first described in Tran et al., 2009. In this work, the authors showed that under some settings, the achievable throughput regions for prioritized broadcast transmissions can be computed by a polynomial-time algorithm. In this paper, we study a class of approximate algorithms based on the Markov Chain Mote Carlo (MCMC) method, for obtaining the maximum sum of prioritized receiver's throughputs. Theoretical analysis and simulation results show the correctness and the convergence speed of the proposed algorithms.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadcast Scheduling Based on Network Coding in Time Critical Wireless Networks","authors":"Cheng Zhan, Yinlong Xu","doi":"10.1109/NETCOD.2010.5487684","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487684","url":null,"abstract":"Using network coding in wireless networks can increase throughput and reduce energy consumption. Recently there are many works focusing on how to utilize network coding to increase throughput, however there are few works considering the quality of service such as delay which is important to time critical applications. This paper focuses on network coding based broadcast scheduling problem in time critical wireless networks with packet delay constraint and aims at minimizing the number of packets which miss their deadlines. Using a weighted graph model, we formulate the problem with an integer linear programming and prove that it is NP-hard. By assigning vertex weight as a decreasing function of packet deadline, we propose a packet encoding and broadcasting algorithm based on the maximum weight clique in the graph. Detailed analysis shows that some typical application requirements can be realized with different weight functions, which can be useful for Qos design. Simulation results show that our algorithm significantly reduce the deadline miss ratio in most cases, which is an important performance metric in time critical applications.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Fundamental Trade-Off between the Download Cost and Repair Bandwidth in Distributed Storage Systems","authors":"S. Akhlaghi, Abbas Kiani, M. Ghanavati","doi":"10.1109/NETCOD.2010.5487685","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487685","url":null,"abstract":"Distributed storage systems are mainly justified due to the limited amount of storage capacity and improving the reliability through distributing data over multiple storage nodes. However, it may happen the data is stored in unreliable nodes, while it is desirable the end user to have a reliable access to the stored data. So,~in an event that a node is damaged,~to prevent the system reliability to regress,~it is necessary to regenerate a new node with the same amount of stored data as the damaged node to retain the number of storage nodes, thereby having the previous reliability. This requires the new node to connect to some of existing nodes, and downloads the required information, thereby occupying some bandwidth, called the repair bandwidth. On the other hand, it is more likely the cost of downloading varies across different nodes. This paper aims at investigating the fundamental trade-off between the download cost and repair bandwidth, and more importantly, it is shown any point on this curve can be achieved through the use of the so called generalized regenerating codes which is an enhancement to the regenerating codes introduced by Dimakis et al. in~cite{dim1}.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128355722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Practical Wireless Network Coding with Constrained Decoding Buffers","authors":"Yu Wang, Hanchen Lu, P. Hong, Kaiping Xue","doi":"10.1109/NETCOD.2010.5487687","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487687","url":null,"abstract":"Abstract- In practical wireless network coding, each node cach-es relayed packets and overheard packets in a buffer for decoding. This buffer is defined as decoding buffer. Relay nodes determine whether network coding can be performed according to cached packets in decoding buffers at their neighbors. This paper analyzes coding performance with constrained decoding buffers. Theoretical results in terms of average encoding number, network throughput and packet loss ratio are given for a line-type or \"X\" coding structure. Moreover, the effect of scheduling policies and bandwidth allocation on coding performance are also analyzed. Coding performance and the optimal bandwidth allocation are evaluated and discussed with numerical results.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Queueing Behavior of Network Coding","authors":"Yuan Yuan, Kui Wu, W. Jia","doi":"10.1109/NETCOD.2010.5487681","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487681","url":null,"abstract":"To deploy network coding (NC) in the Internet core, one difficulty is the selection of coding routers, which largely relies on the understanding of the queueing behavior of NC. In this paper, we build a queueing model to analyze the performance of NC under a bounded maximum opportunistic delay and try to answer several fundamental questions: under what condition is the system stable? how many packets could be possibly coded? what is the quantitative relationship among the traffic arrival rate, the service rate, and the coding opportunities when traffic arrivals and service are both stochastic?","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122918438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Function Computation over Linear Channels","authors":"L. Keller, N. Karamchandani, C. Fragouli","doi":"10.1109/NETCOD.2010.5487679","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487679","url":null,"abstract":"We consider multiple non-colocated sources communicating over a network to a common sink. We assume that the network operation is fixed, and its end result is to convey a fixed linear deterministic transformation of the source data to the sink. This linear transformation is known both at the sources and at the sink. We are interested in the problem of function computation over such networks. We design communication protocols that can perform computation without modifying the network operation, by appropriately selecting the codebook that the sources employ to map their measurements to the data they send over the network.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115135736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple Optimization Model for Wireless Opportunistic Routing with Intra-Session Network Coding","authors":"F. Soldo, A. Markopoulou, Alberto López Toledo","doi":"10.1109/NETCOD.2010.5487667","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487667","url":null,"abstract":"In this paper, we consider the optimization of multi-path opportunistic routing and congestion control in wireless mesh networks with intra-session network coding. We model this as a network utility maximization problem and we design a simple distributed solution that can be obtained by solving the dual problem. This formulation provides useful insight into the complex cross-layer interaction between intra-session network coding, multi-path routing and transport layer and a mathematical foundation for protocol design in this scenario.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123476460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Coding in Passive Optical Networks","authors":"K. Miller, T. Biermann, H. Woesner, H. Karl","doi":"10.1109/NETCOD.2010.5487683","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487683","url":null,"abstract":"One of the most promising technologies for high-speed access to the Internet are Passive Optical Networks as they provide high data rates at low cost. We integrate network coding into the Ethernet Passive Optical Network architecture to increase downlink throughput by up to 50% without changing the physical layer. In contrast to previous work, we suggest to code packets not only between pairs of nodes but also between an arbitrary number of nodes forming a cycle. We characterize the expected gain analytically and by means of simulations and investigate the trade-off between queuing delay, traffic variability, and throughput gain. We show that in practical scenarios, a simple scheme already achieves a reasonable amount of the maximum possible coding gain.","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117120824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Network Coding Approach to IP Traceback","authors":"Pegah Sattari, Minas Gjoka, A. Markopoulou","doi":"10.1109/NETCOD.2010.5487682","DOIUrl":"https://doi.org/10.1109/NETCOD.2010.5487682","url":null,"abstract":"Traceback schemes aim at identifying the source(s) of a sequence of packets and the nodes these packets traversed. This is useful for tracing the sources of high volume traffic, e.g., in Distributed Denial-of-Service (DDoS) attacks. In this paper, we are particularly interested in Probabilistic Packet Marking (PPM) schemes, where intermediate nodes probabilistically mark packets with information about their identity and the receiver uses information from several packets to reconstruct the paths they have traversed. Our work is inspired by two observations. First, PPM is essentially a coupon collector's problem. Second, the coupon collector's problem significantly benefits from network coding ideas. Based on these observations, we propose a network coding-based approach (PPM+NC) that marks packets with random linear combinations of router IDs, instead of individual router IDs. We demonstrate its benefits through analysis. We then propose a practical PPM+NC scheme based on the main PPM+NC idea, but also taking into account the limited bit budget in the IP header available for marking and other practical constraints. Simulation results show that our scheme significantly reduces the number of packets needed to reconstruct the attack graph, in both single- and multi-path scenarios, thus increasing the speed of tracing the attack back to its source(s).","PeriodicalId":347232,"journal":{"name":"2010 IEEE International Symposium on Network Coding (NetCod)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132147463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}